Al Berkley, Princeton Capital Management, at MIT Cyber Security & the Governance Crisis: Complexity, Contention, Cooperation 2014 with Dave Vellante and Charles M. Sennott
Al Berkley, the chairman of Princeton Capital Management, dropped by theCUBE at last week's MIT ECIR Workshop to discuss the changing dynamics of cybersecurity and policymaking with Wikibon's Dave Vellante and guest host Charles Sennott.
Berkley serves on the board of Business Executives for National Security (BENS), a member-funded nonprofit comprised of CEOs and other senior leaders with an interest in tackling emerging security issues. After being commissioned by the U.S. government to provide input on managing online threats, the organization became a sponsor of ECIR, and he was tasked with presenting on its behalf.
Enterprises today have a distinct advantage over their smaller peers, which often lack the resources to effectively safeguard business information. BENS is focusing on equipping decision makers in this segment with the tools they need to stay ahead of hackers, and according to Berkley, data-centric security is proving to be the answer.
Controls designed to protect information rather than the infrastructure on which it resides will substitute many components of traditional network-centric models, he predicts, but adoption will be slow at first. More companies will embrace the technology as governance crawls up the agenda for the private sector and business leaders recognize the need to enforce a set of cohesive rules across the network. Asked about how an organization would go about implement such policies, Berkley says that "the right thing to do is do the things you can control. Then you cooperate with someone else for the things you together can control."
"For example, if I can do my share to do the silly things like passwords and patches, I'm probably taking care of 80 percent of the problems on my personal level. If I as an executive can get everyone in my company do that, I've moved to the company level, and [then] you move to the industry level," he explains.
Berkley believes that governance must be tailored for the specific requirements in each industry; due to the vast differences in data management across sectors, a blanket approach would not adequately address all security concerns. A good reference point for regulatory authorities would be the financial services industry, where the big firms try to solve top-priority issues among themselves before turning to the government for help.
@thecube
#miteicr
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge. If you don’t think you received an email check your
spam folder.
Sign in to MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Register For MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge
Please fill out the information below. You will recieve an email with a verification link confirming your registration. Click the link to automatically sign into the site.
You’re almost there!
We just sent you a verification email. Please click the verification button in the email. Once your email address is verified, you will have full access to all event content for MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge.
Thanks for confirming your account. Now you can access MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge with this email address.
I want my badge and interests to be visible to all attendees.
Checking this box will display your presense on the attendees list, view your profile and allow other attendees to contact you via 1-1 chat. Read the Privacy Policy. At any time, you can choose to disable this preference.
Select your Interests!
add
Upload your photo
Uploading..
OR
Connect via Twitter
Connect via Linkedin
EDIT PASSWORD
Share
Forgot Password
Almost there!
We just sent you a verification email. Please verify your account to gain access to
MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge. If you don’t think you received an email check your
spam folder.
Sign in to MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge.
In order to sign in, enter the email address you used to registered for the event. Once completed, you will receive an email with a verification link. Open this link to automatically sign into the site.
Sign in to gain access to MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge
Please sign in with LinkedIn to continue to MIT Explorations in Cyber International Relations (ECIR) 2014 | Cambridge. Signing in with LinkedIn ensures a professional environment.
Are you sure you want to remove access rights for this user?
Details
Manage Access
email address
Community Invitation
Al Berkley - MIT ECIR 2014 - theCUBE
Al Berkley, Princeton Capital Management, at MIT Cyber Security & the Governance Crisis: Complexity, Contention, Cooperation 2014 with Dave Vellante and Charles M. Sennott
Al Berkley, the chairman of Princeton Capital Management, dropped by theCUBE at last week's MIT ECIR Workshop to discuss the changing dynamics of cybersecurity and policymaking with Wikibon's Dave Vellante and guest host Charles Sennott.
Berkley serves on the board of Business Executives for National Security (BENS), a member-funded nonprofit comprised of CEOs and other senior leaders with an interest in tackling emerging security issues. After being commissioned by the U.S. government to provide input on managing online threats, the organization became a sponsor of ECIR, and he was tasked with presenting on its behalf.
Enterprises today have a distinct advantage over their smaller peers, which often lack the resources to effectively safeguard business information. BENS is focusing on equipping decision makers in this segment with the tools they need to stay ahead of hackers, and according to Berkley, data-centric security is proving to be the answer.
Controls designed to protect information rather than the infrastructure on which it resides will substitute many components of traditional network-centric models, he predicts, but adoption will be slow at first. More companies will embrace the technology as governance crawls up the agenda for the private sector and business leaders recognize the need to enforce a set of cohesive rules across the network. Asked about how an organization would go about implement such policies, Berkley says that "the right thing to do is do the things you can control. Then you cooperate with someone else for the things you together can control."
"For example, if I can do my share to do the silly things like passwords and patches, I'm probably taking care of 80 percent of the problems on my personal level. If I as an executive can get everyone in my company do that, I've moved to the company level, and [then] you move to the industry level," he explains.
Berkley believes that governance must be tailored for the specific requirements in each industry; due to the vast differences in data management across sectors, a blanket approach would not adequately address all security concerns. A good reference point for regulatory authorities would be the financial services industry, where the big firms try to solve top-priority issues among themselves before turning to the government for help.
@thecube
#miteicr